<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An Agent Framework to Support Air Passengers in Departure Terminals</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Maria Nadia Postorino Luca Mantecchini</institution>
        </aff>
      </contrib-group>
      <fpage>75</fpage>
      <lpage>80</lpage>
      <abstract>
        <p>-Airports are complex nodes performing several roles such as interchange terminal, shopping and relaxing center, meeting area for short-time business activities. Airport operators pay great attention to financial profits from their managed assets, while passengers desire spending their slack time inside the terminal in a pleasant way after wasting time in queues and controls to access the gate areas. In such a context, an agent framework is proposed to support travelers' slack time by providing purchase suggestions potentially interesting for them. Recommendations are computed by taking into account passengers' interests, their current position inside the departure terminal and the commercial opportunities available therein. Index Terms-Airport terminal; Arrivals distribution; Multiagent system; Recommender system</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Airports play a fundamental role in the mobility of people
and goods for middle-long range trips and a significant number
of studies exist on the different aspects involved in their
management (e.g., transport, financial and security issues) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]–
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], included strict regulatory constraints to cope with air
travelers inside the departure terminals [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Three main facilities can be identified for a given airport [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]:
i) service areas, ii) waiting areas and iii) commercial activities.
More in detail, in the service areas passengers access all the
services addressed to process the flow of travelers departing
from the airport (e.g., check-in, passport and security controls,
baggage drop) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Waiting areas, where passengers may wait
before boarding their flight, are equipped with seats (e.g.,
lounges and open seating areas, usually close to the departure
gates) and free services for travelers (e.g., information desks,
Wi-Fi, toilets). Finally, commercial areas consists of shops,
food courts, currency exchange and so on, available to air
travelers waiting their flights.
      </p>
      <p>
        In this scenario, air passengers desire to both avoid wasting
time in queues and controls and spend pleasantly their slack
time inside the terminal [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. On the other hand, airport
operators have to optimize all the terminal activities and,
at the same time, give profitability to the assets directly or
indirectly managed by them [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] (e.g., commercial areas inside
the terminal, car parks outside the terminal and so on) by
complying with national and international rules [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        The challenge of satisfying both the passengers’ desire of
enjoying their slack time and the airport operator’s needs of
increasing the revenues from the airport commercial areas is
of great interest. As for the first goal, which is the focus
of this study, a possible approach is that of providing air
travelers with personalized recommendations [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] about
the available commercial facilities that suit as more as possible
their preferences and interests. This task is rather complex to
realize because it requires several steps, namely:
acquiring preliminary information about passengers and
their interests by complying with privacy rules at the same
time [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ];
tracking passengers’ movements around the terminal [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ];
taking into account passengers’ slack time [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>
        Providing passengers with a personalized support requires
the knowledge of some information about them (i.e., age,
sex, job) and their main interests (i.e., preferences for product
categories). As for personal information, some of them could
be obtained/deduced when a passenger is processed at security
checkpoints before entering the departure area1. Unfortunately,
data gathered at airport security checkpoints are subjected to
manifold restrictions mainly due to privacy rules [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], which
can also differ among countries, and are not available for the
above aims. Therefore, the main way to acquire the desired
information is that of requiring it directly to passengers [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ],
for instance in return for the access to some reserved terminal
services offered for free (e.g., Wi-Fi connection, discounts).
      </p>
      <p>
        The second listed step is addressed to identify the current
traveler’s position inside the terminal for providing him/her
with suitable personalized suggestions, offers and so on, by
following a “now, here, only-for-me” approach. As the precise
tracking of passengers’ movements by using GPS2 is
practically impossible, the remaining opportunities are i) the analysis
of the images by dedicate cameras (e.g., different from those
belonging to the security system) and/or ii) the explotation of
Wi-Fi [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]/Bluetooth [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] connections used by smarthphones
and tablets. In particular, the analysis of camera images also
provides people density information [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], while each Wi-Fi
and Bluetooth fingerprints can return the number of connected
devices for each of their hot-spot (note that these two wireless
technologies should be set with different and suitable operating
ranges and that, in the proposed framework, very low power
Bluetooth connections will work only as detection points).
      </p>
      <p>
        1In large airport, security checkpoint operators realize the first identification
by using ticket and document [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], while a further identification may be
based on video analysis processes realized by specialized softwares, which
also allows the traveler’ movements around the terminal to be tracked [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>2The use of the GPS technology is very difficult inside the terminal.</p>
      <p>
        The final required step is addressed to know in advance the
number of passengers that could be present in the departure
terminal at a given time and their estimated slack time.
Generally, the whole amount of demand on a yearly basis
is estimated to understand the development opportunities for
both airlines and airports [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. However, in this case
it is more relevant to identify not simply the number of
departing passengers but mainly the air terminal processing
procedures [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
      </p>
      <p>
        In particular, processing procedures are modeled by queuing
theory approaches, which include the estimate of the time
required to carry out a terminal procedure, roughly made by
the time necessary to provide the service to the passenger and
the time the passenger has to spent in queue. The service time
depends by both the nature of the service and the specific
adopted procedure, which often follows service requirements
and/or security regulations. The time spent in queue depends
on the length of the queue that, in turn, depends on i) the
number of passenger requiring the service at the same time
interval and ii) the efficiency of the service process [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The
set of terminal procedures can be summarized as a chain of
processes, where two consecutive processes are separated by
time varying intervals. In large airports also acting as hubs,
the number of passengers increases quickly during peak hours
and generates congestion and delays, which generally increase
the time required to perform terminal procedures [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
Modeling the probability density function describing passengers
arrivals at airport facilities allows better managing airport
resources [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
      </p>
      <p>
        In the context above described, this paper intends to
contribute by designing an agent-based framework where each
traveler inside the airport departure area is associated with a
personal agent whose goal is to provide personalized
suggestions for enjoying slack times. More in detail, the personal
agent runs on a traveler’s mobile device, by exploiting a
free app required for accessing some reserved free terminal
services, and by interacting with both its user and other
components of the agent-based framework, will build a light user
profile as closed as possible to his/her interests [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. In such a
scenario, the user will be supported with some suggestions
potentially interesting for him/her generated by using both
content-based (CB) [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] and collaborative filtering (CF) [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]
techniques. Such recommendations will take into account i) the
user profile, ii) the current position of the traveler (determined
by exploiting his/her device and the terminal hot-spots), iii)
his/her slack time also depending on the crowd degree of
the terminal areas and the amount of time remaining before
the scheduled departing time and iv) the terminal resources
available for the traveler.
      </p>
      <p>The remaining of the paper is organized as follows. The
proposed agent-based framework is described in detail in
Section II, while Section III introduces some information about
the computation of the slack time, and Section IV deals with
the proposed recommender algorithm. Section V presents the
relevant literature related to the matter presented here and,
finally, in Section VI some conclusions are drawn.</p>
    </sec>
    <sec id="sec-2">
      <title>II. THE PROPOSED AGENT-BASED FRAMEWORK</title>
      <p>The structure of the proposed agent-based framework (from
hereafter only AF) is quite simple (see Figure 1) and consists
of three mutually interacting components which are:
the Personal Agent (PA);
the Commercial Agent (CA);
the Terminal Agent (TA);</p>
      <p>Tasks, profiles and behaviors of all the AF components will
be briefly described in the following sections.</p>
      <p>TA
CA
PA</p>
      <p>Fig. 1. The Agent-based Framework</p>
      <sec id="sec-2-1">
        <title>A. The Personal Agent (PA)</title>
        <p>A PA is an agent pre-activated and identifiable (i.e.,
equipped a unique identifier) associated with a free app
running on a passenger’s device (i.e., a smartphone, a notebook
or a tablet). This app is provided by the airport company and it
is necessary to access to some services provided for free to the
passengers. The PA does not require expensive computational
tasks and/or a great amount of storage resources to its host
device.</p>
        <p>The main tasks carried out by a PA include:
interacting with its owner both for:
– acquiring some personal information;
– acquiring the product categories meeting the owner’s
interest with respect to the terminal resources;
interacting with CAs and TAs agents.</p>
        <p>
          Each PA builds, manages and updates a light XML agent
profile [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ], represented in Fig. 2, consisting of:
the PA Identifier (PAId), which is unique into the AF;
some basic personal owner data3;
3Note that the system recognizes a traveler by means of the identifier of
its associated PA and, therefore, the required personal data only consists of
age, sex, job, trip reason and similar information voluntarily provided by the
traveler in the respect of his/her privacy.
        </p>
        <p>PA Profile</p>
        <p>PA Identifier (PAId)</p>
        <p>Personal Data
Product Categories</p>
        <p>of Interest
the product categories of interest selected by the owner 4
from a list taking into account the commercial resources
available inside the terminal (see below).</p>
        <p>The PA behavior consists of two main activities, namely:
setup: The first time it is active, it receives the list of
the AF product categories of interest (from a TA) and
interacts with the PA owner to acquire both personal and
interests information.
operative: To support its owner, the PA:
– interacts with CAs and TAs, associated with
Bluetooth/Wi-Fi hot-spots, each time its device
enters into their operating ranges5;
– updates its profile and sends a copy to the nearest</p>
        <p>TA (see below);
– computes (CB) and presents (CB and CF)
recommendations generated for the PA owner (see
Section IV) and other opportunities (like advertising,
discount codes and so on) proposed, also based
on his/her current position inside the terminal (see
below).</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. The Commercial Agent (CA)</title>
        <p>This agent is associated with both a commercial facility
placed inside the departure terminal and a Bluetooth hot-spot.
The main activities of a CA consist of:
storing and updating the list of the product categories
made available by the associated commercial facility;
considering the number of devices and PAs active in the
operating range of its associated Bluetooth hot-spot;
taking into account the detected purchases performed
with the PA assistance (e.g., by using a TA discount
code).</p>
        <p>
          interacting with PAs and TAs agents;
The CA behavior consists of the following activities:
setup: The first time the CA is active, it registers its
presence with the closer TA from which receives its
identifier and the AF list of all the product categories
available into the terminal.
operative: The CA : i) selects from the AF list of product
categories those present into its associated commercial
facility (when this CA list changes, it sends a copy to
4Note that for privacy reasons the PA will not monitor the traveler’s activity
on his/her device for automatically extracting his/her interests [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ].
        </p>
        <p>5Note that the PA exploits Bluetooth connections only to communicate its
presence in a narrower range with respect to that of a Wi-Fi hot-spot.
the nearest TA6); ii) sends its product category list to
all the PA connected to its associated hot-spot; iii) sends
periodically the number of devices and the identifiers of
the PAs connected to its associated Bluetooth hot-spot
and the identifiers of the PAs that interacted with the
CA, to assist a traveler in a purchase, to the nearest TA.</p>
      </sec>
      <sec id="sec-2-3">
        <title>C. The Terminal Agent (TA)</title>
        <p>A TA is an agent associated with a Wi-Fi hot-spot. A TA
also generates CF recommendations (for all the PAs connected
with its associated Wi-Fi hot-spot) by taking into account both
the travelers’ interests and the commercial resources available
inside its operating range.</p>
        <p>More TAs can be active into the AF and, from a functional
point of view, they are interchangeable.</p>
        <p>
          Each TA performs manifold activities, more precisely it:
takes into account the number of wireless connections
and agents (e.g., PAs and CAs) active in the operating
range of its associated Wi-Fi hot-spot;
stores the resources available in its operating range.
stores the profiles of each connected PA agent;
collects the information received by CAs (see above) to
roughly monitor the travelers’ position inside the terminal
and their potential interests;
generates CF recommendations (see Section IV);
maintains an updated list of the AF product categories;
To realize its goals a TA builds, manages and updates a
XML profile [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ], represented in Fig. 3, and uses the
information stored in its profile to realize its goals. In particular,
a TA profile is formed by the three sections i) Working Data,
ii) PA Data and iii) CA Data. More in detail:
        </p>
        <p>the Working Data section stores:
6When a new product category needs, its insertion into the AF list of
product categories can be required to a TA by the associated CA.</p>
        <p>TA Profile</p>
        <p>Working Data</p>
        <p>PA Data
SA Data</p>
        <p>TA Identifier</p>
        <p>Agent List
Product Category</p>
        <p>List
...
...
...</p>
        <p>Agent Identifier</p>
        <p>Personal Data</p>
        <p>Product Categories
... of Interest</p>
        <p>Agent Identifier
Product Category</p>
        <p>List
...</p>
        <p>Agent Identifier
...
The recommender algorithm works by considering the slack
time of each traveler, which depends on the arrival time at
the terminal checkpoints with regard to the expected
takeoff time of his/her flight. The slack time can be estimated
based on data collected at the security control desks. In fact,
collecting data coming from the automatic detection of the
barcoded Boarding Pass (BP) (e.g., the barcode reading of paper
and/or mobile boarding cards) of each passenger identifies
both his/her arrival time at security checkpoints and the time
he/she enters inside the departure area to take his/her flight,
other than information on departure and boarding times.</p>
        <p>
          By following [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ], an estimate of the slack time can be
obtained by the Early Scheduled Delay (ESD) measuring the
earliness arrival of passengers at checkpoints, which is here
defined as the difference between the BP scan Time (BP T )
and the Scheduled Boarding Time (SBT ) for the detected
flight. Therefore, for passenger i his/her ESD is obtained as
ESDi = SBTi BP Ti and may represent an estimate of the
slack time STi for each passenger i. However, the reliability
of this estimate depends on the nature of BP T :
        </p>
        <p>If BP T refers to the time the passenger scans the
boarding pass just before passing through the metal detector,
the corresponding slack time is very close to ESD and
can be estimated as:</p>
        <p>STi = ESDi = SBTi</p>
        <p>BP Ti
(1)</p>
        <p>
          If BP T is obtained when the passenger accesses to the
security area, before queuing for the security service, the
related slack time computed by Eq.1 is overestimated. To
obtain a more reliable estimate, the time spent in queue
by each passenger should be used. It is worthwhile to note
that only the average waiting time can be estimated under
the hypothesis that there is no other automatic detection
system before passing through the metal detector. To this
aim, the approach proposed in [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] is briefly summarized.
Each 15 minutes data are aggregated and the discrete
arrival distribution is obtained based on how many
passengers arrive in each time interval. Once obtained this
discrete arrival distribution, the underlying probability
density describing the arrival process is identified by
means of a Chi-Square test. The estimated passenger
probability density function f (x), where x is the Early
Scheduled Delay ESD, is then used to forecast the
number of Expected Passengers EP of flight j in the
given interval ∆t , computed as EP ∆jt = Nj ∫∆t f (x)dx,
where Nj is the expected number of passengers on flight
j. The total number of Expected Passengers in interval ∆t
is then given by EP∆t = ∑j EP ∆jt. Finally, the Slack
Time ST of passenger i during ∆t can be estimated as:
STi = ESDi
        </p>
        <p>LTi
(2)
where LTi is the time spent by passenger i at the
checkpoint, while queuing to be processed, which depends on
the expected number of passengers in ∆t, EP∆t and the
expected number of passengers for all flights j in ∆t,
N∆t = ∑j Nj .</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>IV. THE RECOMMENDER SYSTEM</title>
      <p>Travelers are supported by personalized suggestions
generated by an hybrid approach adopting both CB and CF
techniques. In particular, the CB recommendation system are
computed by PAs, while the CF component is generated by
TAs. Recommendations take into account information coming
from: i) PA profiles; ii) positions and time spent inside the
hot-spots ranges; iii) detected purchases; iv) travelers’ slack
time. The recommender process consists of three main steps,
namely: i) selecting the categories potentially interesting for a
traveler; ii) locating the resources (i.e., commercial facilities)
also based on the traveler’s position; iii) generating some
personalized suggestions by considering the traveler’s slack
time ST .</p>
      <p>To realize the CB stage, a PA selects for its owner the first
m (a system parameter) categories on the basis of a measure
of his/her interest. In particular, the measure of interest for the
k-th category (i.e., Ik) is computed as:</p>
      <p>Ik = (w1 lk + w2 T Bk + w3 T W k) pk</p>
      <p>(3)
where:
l is set to 1 / 0 if the associated category was selected or
not by the traveler as a category of his/her interest.</p>
      <p>
        T B (i.e., T W ) is a parameter, belonging to [0:1] 2 R, accessibility, transparency and scalability [
        <xref ref-type="bibr" rid="ref47">47</xref>
        ]; although these
which considers the time T B (i.e., T W ) spent in Blue- RSs are very attractive, only a few systems are really operative
tooth (i.e., Wi-Fi) hot-spot ranges, where there are items given their intrinsic complexity.
belonging to the k-th category, as a rough measure of the The proposed RS is characterized by locating travelers in
interest for those categories. T B is computed as: order to identify both their interest and the better facilities
8&lt; 0 if 1 &gt; T B for them. Different localization schemes (based on wireless
T B = T B= 2 if 1 &lt; T B 2 connections and a wide range of different sensors) have
: 1 if 2 &lt; T B been investigated [
        <xref ref-type="bibr" rid="ref48">48</xref>
        ] for understanding shoppers behavior
where 1 and 2 are system time thresholds (note that within retail spaces. In [
        <xref ref-type="bibr" rid="ref49">49</xref>
        ] a framework that should identify
after a time greater than 2 the value of T B is set to 1). customers malling behaviors by using smartphones, named
T W is computed in a similar way. MallingSense, is presented. It consists of three steps; customer
p is set to 0:5 / 1 if an item of that category has been data collection, customer trace extraction, and behavior model
purchased or not. It decreases the value of Ik if an item analysis. MallingSense was positively tested on real data. A
belonging to k-th category has been already purchased in store-type RS for physical stores considering the learned
cusorder to give priority to other categories. tomers’ preference’ and temporal influence is proposed in [
        <xref ref-type="bibr" rid="ref50">50</xref>
        ].
w1, w2 and w3 are system weights ranging in [0:1] 2 R, It finds customers’ preferences in physical stores from their
with w1 ≪ w2 ≪ w3 and ∑i3=1 wi = 1. interaction behaviors, non-intrusively generated from WiFi
Similarly, a TA will select, for each PA in its operating logs, confirming that customers preferences are influenced by
range, the first m categories popular among similar travelers intrinsic interests and temporal data. In the same context, [
        <xref ref-type="bibr" rid="ref51">51</xref>
        ]
(based on their interest degree measures). The similarity describes a location-aware RS matching customers shopping
between two travelers u and q (i.e., u;q) is calculated by needs with location-dependent vendor offers and promotions.
using the Jaccard similarity measure [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ] on the basis of The other main considered question is how identifying
tnhuemirbaesrsoofcicaatetedgoPrAiesprsohfialreesd (bPy)uasanduqq =is djjPPivuui[\dPPeqqdjj ,bywhtheeretotthael tshpiescipfiacpetrr,aviteliesrsp’roipnotesreedsttsooansstihgen bthaesissaomfethveailrueloocfatiinotne.reIsnt
number of unique categories in u and q. to all the categories present in the range of a hot-spot on the
      </p>
      <p>
        Finally, let X be the set of the m CB and the m CF basis of his/her stop time therein. This solution is due to the
categories selected for each traveler. Then the commercial impossibility of identifying a specific topic of interest. The
facilities where there are items belonging to the selected problem is similar to that of measuring the interest in the
categories will be identified by the PA (by using the data stored topics contained into a visited Web page. In this case, the
in its profile). Based on the current traveler’s position, his/her same measure of interest is assigned to all the topics present
data (i.e., age, sex, job and so on) and his/her slack time ST , in a visited page, for instance, based on the time spent by a
the most relevant personalized suggestions will be presented user on the Web page, its length or a score assigned by the
to the traveler. visitor. A RS using a similar approach is described in [
        <xref ref-type="bibr" rid="ref52">52</xref>
        ]
where the visiting time of a Web page is the main parameter
V. RELATED WORK to estimate the user’s interest in the instances present therein,
while in [
        <xref ref-type="bibr" rid="ref53">53</xref>
        ], [
        <xref ref-type="bibr" rid="ref54">54</xref>
        ] the typology of the device exploited in the
page access is also considered.
      </p>
      <p>Recommender systems (RSs) have been widely investigated
in the literature and their contextualization is beyond our aims.</p>
      <p>
        However, interested readers can refer to [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ]–[
        <xref ref-type="bibr" rid="ref38">38</xref>
        ]
      </p>
      <p>
        RSs are generally classified in [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ]: (i) Content-based (CB), VI. CONCLUSIONS AND FUTURE WORK
based on past users’ interests [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ]; (ii) Collaborative Filtering
(CF), searching people having similar interests [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ], [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ]; (iii) This paper proposed the design of an agent framework to
Demographic, identifying people belonging to the same demo- support air travelers slack time inside departure terminal. To
graphic niche [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ]; (iv) Knowledge-based, inferring people’s this aim, for each passenger some suggestions about the
comneeds and references [
        <xref ref-type="bibr" rid="ref44">44</xref>
        ]. However, the most performing RSs mercial opportunities available inside the terminal, potentially
are usually the hybrid systems [
        <xref ref-type="bibr" rid="ref45">45</xref>
        ], which combine several interesting for him/her, are generated. Such recommendations
approaches to promote mutual synergies, as in [
        <xref ref-type="bibr" rid="ref46">46</xref>
        ]. suitably take into account traveler’s interest, current position
      </p>
      <p>Another common way to classify RSs is based on the inside the terminal and slack time.
adoption of a centralized or distributed architecture. The first Currently, an app for the free access to some terminal
one is adopted by many RSs because it is easy to implement services is in the designing phase. This app also should
given that it exploits a unique server and a unique database to contribute to collect data coming from both travelers and some
perform all the tasks. Many e-Commerce sites like Amazon hot-spots to perform a preliminary check about the potential
(www.amazon.com) and eBay (www.ebay.com) implement feasibility of the proposed framework.
this type of RS, mainly by combining CB and CF techniques.</p>
      <p>However, these RSs are affected by efficiency, fault tolerance, ACKNOWLEDGMENT
scalability and privacy problems. Differently, distributed RSs This study has been supported by NeCS Laboratory
exploit more computational resources but guarantee openness, (DICEAM, University Mediterranea of Reggio Calabria).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Francis</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Humphreys</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Fry</surname>
          </string-name>
          , “
          <article-title>The benchmarking of airport performance,” J. air Transport Manag</article-title>
          ., vol.
          <volume>8</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>239</fpage>
          -
          <lpage>247</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Guimera</surname>
          </string-name>
          and
          <string-name>
            <given-names>L. A. N.</given-names>
            <surname>Amaral</surname>
          </string-name>
          , “
          <article-title>Modeling the world-wide airport network,” The European Physical J</article-title>
          ., vol.
          <volume>38</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>381</fpage>
          -
          <lpage>385</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kazda</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Caves</surname>
          </string-name>
          ,
          <article-title>Airport design and operation</article-title>
          .
          <source>Emerald</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Postorino</surname>
          </string-name>
          and
          <string-name>
            <surname>F. G.</surname>
          </string-name>
          <article-title>Pratico`, “An application of the multi-criteria decision-making analysis to a regional multi-airport system</article-title>
          ,
          <source>” Research in Transportation Business &amp; Management</source>
          , vol.
          <volume>4</volume>
          , pp.
          <fpage>44</fpage>
          -
          <lpage>52</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Postorino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mantecchini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Paganelli</surname>
          </string-name>
          , “
          <article-title>Green airport investments to mitigate externalities: Procedural and technological strategies,” in Sustainable Entrepreneurship and Investments in the Green Economy</article-title>
          .
          <source>IGI Global</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>231</fpage>
          -
          <lpage>256</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>C.</given-names>
            <surname>Malandri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mantecchini</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Postorino</surname>
          </string-name>
          , “
          <article-title>Airport ground access reliability and resilience of transit networks: a case study</article-title>
          ,
          <source>” Transportation Research Procedia</source>
          , vol.
          <volume>27</volume>
          , pp.
          <fpage>1129</fpage>
          -
          <lpage>1136</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Milde</surname>
          </string-name>
          ,
          <source>Int. air law and ICAO. Eleven Int. Pub.</source>
          ,
          <year>2008</year>
          , vol.
          <volume>4</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Edwards</surname>
          </string-name>
          ,
          <article-title>The modern airport terminal: New approaches to airport architecture</article-title>
          .
          <source>Taylor &amp; Francis</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ashford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Coutu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Beasley</surname>
          </string-name>
          , Airport operations,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Fodness</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Murray</surname>
          </string-name>
          , “
          <article-title>Passengers' expectations of airport service quality</article-title>
          ,
          <source>” J. of Services Marketing</source>
          , vol.
          <volume>21</volume>
          , no.
          <issue>7</issue>
          , pp.
          <fpage>492</fpage>
          -
          <lpage>506</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lin</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Chen</surname>
          </string-name>
          , “
          <article-title>Passengers' shopping motivations and commercial activities at airports-the moderating effects of time pressure and impulse buying tendency,” Tourism Management</article-title>
          , vol.
          <volume>36</volume>
          , pp.
          <fpage>426</fpage>
          -
          <lpage>434</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Mew</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. C.</given-names>
            <surname>Alexander</surname>
          </string-name>
          , I. Bergera,
          <string-name>
            <given-names>M.</given-names>
            <surname>Chanes</surname>
          </string-name>
          , G. Crysler,
          <string-name>
            <given-names>K.</given-names>
            <surname>Dana</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Desai</surname>
          </string-name>
          ,
          <article-title>Airport financial management</article-title>
          .
          <source>Ashgate</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Palopoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          `, “
          <article-title>A multi-tiered recommender system architecture for supporting e-commerce,” in Intelligent Distributed Computing VI</article-title>
          . Springer,
          <year>2013</year>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Postorino and G. M. L. Sarne</surname>
          </string-name>
          `, “
          <article-title>A neural network hybrid recommender system</article-title>
          ,”
          <source>in Proceedings of the 2011 conference on neural Nets WIRN10</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>180</fpage>
          -
          <lpage>187</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Palopoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          `, “
          <article-title>Introducing specialization in e-commerce recommender systems</article-title>
          ,” Concurrent Engineering, vol.
          <volume>21</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>187</fpage>
          -
          <lpage>196</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Takakuwa</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Oyama</surname>
          </string-name>
          , “
          <article-title>Modeling people flow: simulation analysis of international-departure passenger flows in an airport terminal,”</article-title>
          <source>in Proc. 35th conf. on Winter simulation: driving innovation. Winter Simulation Conf., 2003</source>
          , pp.
          <fpage>1627</fpage>
          -
          <lpage>1634</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>M. L. Tam</surname>
            ,
            <given-names>W. H.</given-names>
          </string-name>
          <string-name>
            <surname>Lam</surname>
            , and
            <given-names>H. P.</given-names>
          </string-name>
          <string-name>
            <surname>Lo</surname>
          </string-name>
          , “
          <article-title>Modeling air passenger travel behavior on airport ground access mode choices</article-title>
          ,
          <source>” Transportmetrica</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>135</fpage>
          -
          <lpage>153</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>K.</given-names>
            <surname>Artur</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Tomasz</surname>
          </string-name>
          , “
          <article-title>A model of check-in system management to reduce the security checkpoint variability</article-title>
          ,
          <source>” Simulation Modelling Practice and Theory</source>
          , vol.
          <volume>74</volume>
          , pp.
          <fpage>80</fpage>
          -
          <lpage>98</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>K.</given-names>
            <surname>Yoo</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Choi</surname>
          </string-name>
          , “
          <article-title>Analytic hierarchy process approach for identifying relative importance of factors to improve passenger security checks at airports</article-title>
          ,” J. of Air Transport Manag., vol.
          <volume>12</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>135</fpage>
          -
          <lpage>142</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>K. W.</given-names>
            <surname>Bowyer</surname>
          </string-name>
          , “
          <article-title>Face recognition technology: security versus privacy</article-title>
          ,
          <source>” IEEE Technology and society magazine</source>
          , vol.
          <volume>23</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>19</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>G. M. L. Sarne</surname>
          </string-name>
          `, “
          <article-title>A collaborative filtering recommender exploiting a som network,”</article-title>
          <source>in Recent Advances of Neural Network Models and Applications</source>
          . Springer,
          <year>2014</year>
          , pp.
          <fpage>215</fpage>
          -
          <lpage>222</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>F.</given-names>
            <surname>Ohrtman</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Roeder</surname>
          </string-name>
          , Wi-Fi
          <source>handbook: Building</source>
          <volume>802</volume>
          .
          <article-title>11 b wireless networks</article-title>
          .
          <source>McGraw-Hill</source>
          New York, NY,
          <year>2003</year>
          , vol.
          <volume>67</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Miller</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Bisdikian</surname>
          </string-name>
          ,
          <article-title>Bluetooth revealed: the insider's guide to an open specification for global wireless communication</article-title>
          .
          <source>Prentice Hall PTR</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S. A. M.</given-names>
            <surname>Saleh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Suandi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Ibrahim</surname>
          </string-name>
          , “
          <article-title>Recent survey on crowd density estimation and counting for visual surveillance</article-title>
          ,
          <source>” Engineering Applications of Artificial Intelligence</source>
          , vol.
          <volume>41</volume>
          , pp.
          <fpage>103</fpage>
          -
          <lpage>114</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A.</given-names>
            <surname>Andreoni</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Postorino</surname>
          </string-name>
          , “
          <article-title>Time series models to forecast air transport demand: a study about a regional airport</article-title>
          ,
          <source>” IFAC Proceedings Volumes</source>
          , vol.
          <volume>39</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>101</fpage>
          -
          <lpage>106</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Postorino</surname>
          </string-name>
          , “
          <article-title>A comparison among different approaches for the evaluation of the air traffic demand elasticity,” WIT Transactions on Ecology and the Environment</article-title>
          , vol.
          <volume>67</volume>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>R. De Neufville</surname>
          </string-name>
          , “
          <article-title>Airport systems planning and design,” Air Transport Management: An International Perspective</article-title>
          , p.
          <fpage>61</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Postorino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mantecchini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Malandri</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Paganelli</surname>
          </string-name>
          , “
          <article-title>Airport passenger arrival process: Estimation of earliness arrival functions</article-title>
          ,” Transportation Research Procedia, In Press.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          `, and
          <string-name>
            <given-names>D.</given-names>
            <surname>Ursino</surname>
          </string-name>
          , “
          <article-title>A multi-agent model for handling e-commerce activities,” vol. 2002-Jan</article-title>
          . IDEAS,
          <year>2002</year>
          , pp.
          <fpage>202</fpage>
          -
          <lpage>211</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>P.</given-names>
            <surname>Lops</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. De Gemmis</surname>
          </string-name>
          , and G. Semeraro, “
          <article-title>Content-based recommender systems: State of the art and trends,” in Recommender systems handbook</article-title>
          . Springer,
          <year>2011</year>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>X.</given-names>
            <surname>Su</surname>
          </string-name>
          and
          <string-name>
            <given-names>T. M.</given-names>
            <surname>Khoshgoftaar</surname>
          </string-name>
          , “
          <article-title>A survey of collaborative filtering techniques</article-title>
          ,
          <source>” Advances in artificial intelligence</source>
          , vol.
          <year>2009</year>
          , p.
          <fpage>4</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
            ,
            <given-names>G. M. L.</given-names>
          </string-name>
          <string-name>
            <surname>Sarne`</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Ursino</surname>
          </string-name>
          , and G. Terracina, “
          <article-title>Ec-xamas: supporting e-commerce activities by an xml-based adaptive multi-agent system</article-title>
          ,
          <source>” Applied Artificial Intelligence</source>
          , vol.
          <volume>21</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>529</fpage>
          -
          <lpage>562</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci and G. M. L. Sarne</surname>
          </string-name>
          `, “
          <article-title>Masha: A multi-agent system handling user and device adaptivity of web sites,” User modeling and useradapted interaction</article-title>
          , vol.
          <volume>16</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>435</fpage>
          -
          <lpage>462</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
            ,
            <given-names>G. M. L.</given-names>
          </string-name>
          <string-name>
            <surname>Sarne</surname>
            `, G. Terracina, and
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Ursino</surname>
          </string-name>
          , “
          <article-title>An xml-based adaptive multi-agent system for handling e-commerce activities,” in Web Services-ICWS-</article-title>
          <string-name>
            <surname>Europe</surname>
            <given-names>'</given-names>
          </string-name>
          03. Springer,
          <year>2003</year>
          , pp.
          <fpage>152</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Grefenstette</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <article-title>Explorations in Authomatic Thesaurus Construction</article-title>
          . Hingham, MA, USA: Kluwer Academic Pub.,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>G.</given-names>
            <surname>Adomavicius</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Tuzhilin</surname>
          </string-name>
          , “
          <article-title>Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions,” IEEE trans. on knowledge and data engineering</article-title>
          , vol.
          <volume>17</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>734</fpage>
          -
          <lpage>749</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>F.</given-names>
            <surname>Ricci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rokach</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Shapira</surname>
          </string-name>
          , “
          <article-title>Introduction to recommender systems handbook,” in Recommender systems handbook</article-title>
          . Springer,
          <year>2011</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>X.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Steck</surname>
          </string-name>
          , “
          <article-title>A survey of collaborative filtering based social recommender systems</article-title>
          ,” Computer Comm., vol.
          <volume>41</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          , “
          <article-title>Hybrid Web Recommender Systems,” in The Adaptive Web, ser</article-title>
          .
          <source>LNCS</source>
          , vol.
          <volume>4321</volume>
          . Springer,
          <year>2007</year>
          , pp.
          <fpage>377</fpage>
          -
          <lpage>408</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>P.</given-names>
            <surname>Lops</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gemmis</surname>
          </string-name>
          , and G. Semeraro, “
          <article-title>Content-based Recommender Systems: State of the Art and Trends,” in Recommender Systems Handbook</article-title>
          . Springer,
          <year>2011</year>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>J.</given-names>
            <surname>Breese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Heckerman</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Kadie</surname>
          </string-name>
          , “
          <article-title>Empirical Analysis of Predictive Algorithms for Collaborative Filtering,”</article-title>
          <source>in Proc. 14th Int. Conf. on Uncertainty in Artificial Intell</source>
          . Morgan Kaufmann,
          <year>1998</year>
          , pp.
          <fpage>43</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>X.</given-names>
            <surname>Su</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Khoshgoftaar</surname>
          </string-name>
          , “
          <article-title>A Survey of Collaborative Filtering Techniques,” Adv</article-title>
          . in Artif. Intell., vol.
          <year>2009</year>
          , pp.
          <volume>4</volume>
          :
          <fpage>2</fpage>
          -
          <issue>4</issue>
          :
          <fpage>2</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>C.</given-names>
            <surname>Stiller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ross</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Ament</surname>
          </string-name>
          , “
          <article-title>Demographic Recommendations for WEITBLICK, an Assistance System for Elderly,”</article-title>
          <source>in Comm. and Information Technologies</source>
          ,
          <source>2010 Int. Symp. . IEEE</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>406</fpage>
          -
          <lpage>411</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>S.</given-names>
            <surname>Trewin</surname>
          </string-name>
          , “
          <article-title>Knowledge-based recommender systems</article-title>
          ,
          <source>” Encyclopedia of Library and Information Science</source>
          , vol.
          <volume>69</volume>
          , no.
          <source>Suppl</source>
          .
          <volume>32</volume>
          , p.
          <fpage>69</fpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          , “
          <source>Hybrid Recommender Systems: Survey and Experiments,” UMUAI</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>331</fpage>
          -
          <lpage>370</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci and G. M. L.</surname>
          </string-name>
          <article-title>Sarne`, “Multi-agent technology and ontologies to support personalization in b2c e-commerce,”</article-title>
          <source>Electronic Commerce Research and Applications</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>23</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Tanenbaum and M. Van Steen</surname>
          </string-name>
          ,
          <article-title>Distributed systems: principles and paradigms</article-title>
          . Prentice-Hall,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>S.</given-names>
            <surname>Rallapalli</surname>
          </string-name>
          , “
          <article-title>Mobile localization: approach and applications</article-title>
          ,”
          <source>Ph.D. dissertation</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Min</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Yoo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Song</surname>
          </string-name>
          , “
          <article-title>Understanding customer malling behavior in an urban shopping mall using smartphones,” in Proc of ACM conf. on Pervasive and ubiquitous comp</article-title>
          . ACM,
          <year>2013</year>
          , pp.
          <fpage>901</fpage>
          -
          <lpage>910</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sun</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Chen</surname>
          </string-name>
          , “
          <article-title>Mining customer preference in physical stores from interaction behavior</article-title>
          ,
          <source>” IEEE Access</source>
          , vol.
          <volume>5</volume>
          , pp.
          <volume>17</volume>
          <fpage>436</fpage>
          -
          <lpage>17</lpage>
          449,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zheng</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Mokbel</surname>
          </string-name>
          , “
          <article-title>Location-based and preference-aware recommendation using sparse geo-social networking data,”</article-title>
          <source>in Proc. of conf. on advances in geographic inform. sys. ACM</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>199</fpage>
          -
          <lpage>208</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>J.</given-names>
            <surname>Parsons</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Ralph</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Gallagher</surname>
          </string-name>
          , “
          <article-title>Using Viewing Time to Infer User Preference in Recommender Systems,” in AAAI Work. on Semantic Web Personalization</article-title>
          . Menlo Park, CA, USA: AAAI.,
          <year>2004</year>
          , pp.
          <fpage>52</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          `, and
          <string-name>
            <given-names>S.</given-names>
            <surname>Garruzzo</surname>
          </string-name>
          , “
          <article-title>Muaddib: A distributed recommender system supporting device adaptivity</article-title>
          ,
          <source>” ACM Transactions on Information Systems (TOIS)</source>
          , vol.
          <volume>27</volume>
          , no.
          <issue>4</issue>
          , p.
          <fpage>24</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [54]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci and G. M. L. Sarne</surname>
          </string-name>
          `, “
          <article-title>A multi-agent recommender system for supporting device adaptivity in e-commerce,”</article-title>
          <source>Journal of Intelligent Information Systems</source>
          , vol.
          <volume>38</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>393</fpage>
          -
          <lpage>418</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>